cybersecurity Y.V
Across
- 2. Way a programmer may bypass securityto access a computer through trapdoor programs
- 5. Security system that forms a virtual perimeter around a network
- 6. An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
- 7. software that is secretly installed on a user's device to gather sensitive data
- 9. Damage or destroy a computer network or system
- 10. A malicious computer program
Down
- 1. Block elements from sending you information
- 3. Unwanted advertising, the email equivalant of physical junk
- 4. person who use their skills and talents for good work and keep data safe from other (2_words)
- 8. Person who try to gain unauthorized